Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Actively Exploited

The pro-Iran hacking group Handala has claimed responsibility for a significant cyber-attack on the U.S. medical technology firm Stryker. They assert that they have deployed destructive wiper malware that has wiped out approximately 200,000 systems within the company. This attack raises concerns about the security of critical healthcare infrastructure, as Stryker is known for its medical devices and equipment. The incident highlights the ongoing risks faced by organizations in the healthcare sector from state-sponsored cyber threats. As healthcare systems increasingly rely on digital solutions, the potential for disruption and data loss becomes more pronounced, making it essential for companies to bolster their cybersecurity measures.

Impact: Stryker Corporation systems, potentially affecting medical devices and healthcare infrastructure.
Remediation: Companies should enhance their cybersecurity protocols, conduct regular system backups, and ensure that all software is updated to the latest security standards.
Read Original

Bell Ambulance has reported a significant data breach that occurred in February 2025, affecting approximately 238,000 individuals. The breach exposed sensitive personal information, including financial and health data. Bell Ambulance, which provides emergency medical services across the U.S., now faces scrutiny over how the breach happened and how it will impact those affected. This incident raises concerns about the protection of personal information within healthcare services, particularly as breaches in this sector can lead to identity theft and other fraudulent activities. Individuals whose data was compromised should remain vigilant and consider monitoring their financial accounts for any suspicious activity.

Impact: Personal information, financial information, health information
Remediation: Individuals should monitor their financial accounts and consider identity theft protection services.
Read Original

A recent study by Quest Software has revealed that only 24% of organizations conduct semiannual tests of their identity disaster recovery plans. This lack of testing raises concerns about how well companies can restore their authentication systems following cyber incidents. With identity management being a critical component of cybersecurity, the inconsistency in testing could leave many organizations vulnerable to prolonged downtimes or breaches. The findings suggest that a significant number of organizations may not be adequately prepared to respond effectively in the event of an identity-related cyber attack. As identity systems are central to access control and data protection, this gap in preparedness could have serious implications for businesses and their customers.

Impact: Identity disaster recovery plans
Remediation: Organizations should implement regular testing of identity disaster recovery plans and establish a schedule for semiannual reviews.
Read Original

A serious vulnerability has been discovered in the popular Java security library pac4j, as reported by Amartya Jha, co-founder and CEO of CodeAnt AI. This flaw is classified as having maximum severity and can be exploited by individuals with basic knowledge of JSON Web Tokens. The issue primarily affects developers and organizations that use pac4j for authentication and authorization in their applications. If exploited, attackers could potentially gain unauthorized access to sensitive data or systems. Users of pac4j are urged to take this warning seriously and assess their security measures to prevent possible exploitation.

Impact: pac4j Java security library
Remediation: Users should review their implementation of pac4j and apply any security patches or updates provided by the maintainers as soon as they are available.
Read Original

Recent reports indicate that attackers are exploiting vulnerabilities in Fortinet's FortiGate Next-Generation Firewall appliances. These devices have been misconfigured, making them targets for network infiltration, particularly affecting healthcare and government organizations, as well as managed service providers. The exploitation could lead to unauthorized access to sensitive data and systems, raising serious security concerns. As these attacks are part of a broader campaign, organizations using FortiGate devices need to take immediate action to secure their networks. This incident serves as a reminder of the importance of proper configuration and timely updates for security appliances.

Impact: Fortinet FortiGate Next-Generation Firewall appliances
Remediation: Organizations should review and correct the configuration of their FortiGate devices, apply any available patches, and ensure that they are following best practices for firewall security.
Read Original

The article discusses the ongoing challenge of securing outdated industrial controllers that are still in use across various sectors in the U.S. Many of these controllers date back 30 years, and some were developed by individuals who have since passed away, complicating efforts to update or secure the technology. This situation is concerning because these legacy systems can be vulnerable to cyberattacks, yet they are still critical for operations in industries such as manufacturing and utilities. As these devices are often sold on platforms like eBay, there is a growing concern about who is acquiring and potentially exploiting these systems. The article emphasizes the need for organizations to prioritize the security of these aging technologies to prevent potential breaches.

Impact: 30-year-old industrial controllers
Remediation: Organizations should assess their use of legacy industrial controllers and implement security measures, such as network segmentation and regular security audits, to mitigate risks.
Read Original

A recent security incident involved the compromise of Xygeni's GitHub Action, specifically the xygeni/xygeni-action. Attackers managed to inject malicious code through a technique known as tag poisoning, allowing them to maintain an active command and control (C2) implant for nearly a week. This breach potentially puts developers and organizations using this action at risk, as it could lead to unauthorized access or data breaches. The incident underscores the vulnerabilities present in third-party software components, which can be exploited to target a wide range of users. Companies relying on GitHub Actions for their development processes should review their security practices and ensure they are using verified and secure components.

Impact: Xygeni's xygeni/xygeni-action GitHub Action
Remediation: Review and update to a secure version of the xygeni/xygeni-action. Implement stricter validation of third-party actions in CI/CD pipelines.
Read Original

WhatsApp has launched a new feature that allows parents to manage accounts for pre-teens using the app. This initiative enables parents and guardians to control who can contact their children and which groups they can join, aiming to enhance safety for younger users. The feature is part of WhatsApp's commitment to creating a safer environment for minors online. With the rise of social media use among younger individuals, this move is significant as it addresses parental concerns about privacy and safety. By giving parents more oversight, WhatsApp hopes to foster responsible usage of the app among pre-teens.

Impact: WhatsApp
Remediation: N/A
Read Original

The pro-Palestinian hacktivist group Handala has claimed responsibility for a significant cyberattack on medical technology company Stryker. This attack reportedly wiped out around 200,000 systems, causing major disruptions to Stryker's global operations. Employees and contractors have reported widespread outages, affecting their ability to carry out normal business functions. The incident raises concerns not only about the immediate impact on Stryker's operations but also about the potential risks to patient care and safety, given the company's role in the medical technology sector. This attack highlights the growing trend of politically motivated cyberattacks targeting critical infrastructure.

Impact: Stryker's medical technology systems
Remediation: N/A
Read Original

A newly discovered SQL injection vulnerability in the Ally plugin for WordPress, developed by Elementor, is raising concerns for over 400,000 installations. This flaw allows attackers to potentially access sensitive data without needing to authenticate, putting numerous websites at risk. The plugin is designed to enhance web accessibility, making its widespread use particularly alarming given the ease with which malicious actors could exploit this weakness. Website owners using the Ally plugin should prioritize checking for updates or patches to secure their sites against possible data breaches. Failure to address this vulnerability could lead to significant data theft and privacy violations for users of affected sites.

Impact: Elementor Ally plugin for WordPress, affecting over 400,000 installations
Remediation: Update to the latest version of the Ally plugin as soon as a patch is available; monitor for further updates from Elementor.
Read Original

A significant hardware vulnerability has been identified that affects approximately 25% of Android phones, particularly those in the budget category. This flaw allows attackers to potentially steal sensitive information, including cryptocurrency wallet seed phrases, in under a minute. Users of affected devices should be concerned as this could lead to serious financial losses and privacy breaches. The issue emphasizes the need for manufacturers to improve security measures in their devices and for users to be vigilant about their phone's security. It's crucial for owners of budget Android phones to check if their devices are impacted and take necessary precautions.

Impact: Budget Android phones from various manufacturers.
Remediation: Users should check for updates from their device manufacturer and apply any security patches as they become available. Additionally, users can enhance their security by changing sensitive information, such as wallet seed phrases, and being cautious about app installations.
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has directed federal agencies to address a critical vulnerability in n8n, an open-source workflow automation tool, that is currently being exploited by attackers. This vulnerability allows remote code execution, meaning that an unauthorized user can potentially take control of affected systems. Government agencies must prioritize patching their systems to prevent further exploitation and protect sensitive data. The urgency of this directive reflects the growing concerns about the security of automation tools in government operations. Agencies are advised to act swiftly to ensure their systems are secure against this active threat.

Impact: n8n workflow automation tool
Remediation: CISA recommends that all federal agencies apply the latest patches for n8n to mitigate the vulnerability. Specific patch versions were not mentioned, but users should ensure they are running the most recent, secure versions of the software.
Read Original
Actively Exploited

Researchers at Mirage Security have identified a new vishing-as-a-service platform that utilizes AI voice technology from ElevenLabs to facilitate 'press 1' scams. In these scams, fraudsters spoof phone numbers belonging to trusted organizations, like banks, and then call potential victims. They play pre-recorded messages designed to instill fear, urging victims to share sensitive personal information. This type of scam can lead to identity theft and financial loss for individuals. The misuse of advanced AI for these malicious purposes raises concerns about the evolving tactics of scammers and the effectiveness of current security measures to protect consumers.

Impact: Victims of vishing scams, financial institutions, ElevenLabs TTS technology
Remediation: Users are advised to be cautious of unsolicited calls and to verify the identity of the caller by contacting the institution directly through official channels. Companies should enhance their fraud detection measures and educate customers about recognizing vishing attempts.
Read Original

A new wave of attacks associated with the 'PhantomRaven' supply-chain campaign is targeting the npm registry, where attackers have uploaded 88 malicious packages. These packages are designed to steal sensitive data from JavaScript developers, posing a significant risk to their projects and potentially compromising their intellectual property. Researchers found that the malicious code can extract various types of developer information, which could be exploited for further attacks or sold on the dark web. This incident serves as a reminder for developers to be cautious about the packages they use and to verify their sources before integrating them into their work. As the use of npm packages continues to grow, so does the potential for such supply-chain attacks, making awareness and vigilance crucial for developers.

Impact: npm packages, JavaScript development tools
Remediation: Developers should audit their dependencies, avoid unverified packages, and use security tools to monitor for malicious code.
Read Original

In 2025, France's National Cybersecurity Agency reported a decrease in ransomware attacks, although small and medium-sized businesses (SMBs) continued to be the primary targets. This trend suggests that while some progress may have been made in combating ransomware, these smaller organizations remain vulnerable and appealing to cybercriminals due to potentially weaker defenses. The agency's findings indicate that the need for enhanced cybersecurity measures among SMBs is still crucial. As these businesses play a vital role in the economy, ensuring their protection against ransomware is essential for overall national security. Companies must prioritize cybersecurity training and invest in robust defenses to mitigate risks.

Impact: Small and medium-sized businesses in France
Remediation: Increase cybersecurity measures, provide training for employees, invest in robust security solutions
Read Original
PreviousPage 14 of 121Next